The use of Near-Surface Mounted (NSM) Carbon-Fiber-Reinforced Polymer (CFRP) strips is an efficient technology for increasing flexural and shear strength or for repairing damaged Reinforced Concrete (RC) members. This strengthening method is a promising technology. However, the thin layer of concrete covering the NSM-CFRP strips is not adequate to resist heat effect when directly exposed to a fire or at a high temperature. There is clear evidence that the strength and stiffness of CFRPs severely deteriorate at high temperatures. Therefore, in terms of fire resistance, the NSM technique has a significant defect. Thus, it is very important to develop a set of efficient fire protection systems to overcome these disadvantages. This paper presents a numerical study that investigates the fire behavior of thermally insulated RC beams flexurally strengthened with NSM-CFRP strips and subjected to fire exposure according to the ISO 834 standard. The numerical study considered three-dimensional finite element models in the ABAQUS software that have been developed to simulate and predict the performance (thermal and structural response) of fire endurance tests on strengthened, uninsulated strengthened, and thermally insulated beams strengthened with NSM-CFRP strips, which were exposed to fire and had different fire insulation schemes. The insulation used was plaster from local material with a thickness range of 25 to 50mm. The variation of the thermal and mechanical properties with the temperature of the constituent materials was considered. All beams' mechanical and thermal responses were adequately simulated using numerical models. The results of the numerical simulations were in good agreement with the experimental data. The fire behavior of the NSM-CFRP strengthened RC beams was examined and particularly the efficiency of the NSM strengthening system during the fire. The behavior in the fire of the NSM-CFRP strengthening system on the RC beams thermally protected with different fire insulation schemes was assessed. Finally, the effectiveness of fire insulation was studied.
A simple and novel membraneless paper-based microfluidic fuel cell was presented in this study. The occurrence of laminar flow was employed to ensure no mixing of the fuel and oxidant fluids along the bath of reaction. The acidic wastewater was used as a fuel. It was an air-breathing cell, so air and tab water were used as oxidants. Both the fuel and tab water flowed continuously under gravity. Whatman filter paper was used for preparation of the fuel cell channel and two carbon fibre electrodes were used and firmed on the edges of the cell. The performance of the cell was examined over three consecutive days. The results indicated that the present cell has the potential to generate electric power, but an extensive study is required to harv
... Show MoreThe Beggar (1965) is a story of isolation and depression which is written by the Egyptian novelist Naguib Mahfouz who is considered the father of Arabic Literature in the modern era. Specifically, he refers in his great novel called The Beggar that the man unable to achieve psychological revival after Nasser’s revolution, the man sacrificed his own job and his family for a desire that increases his feelings of alienation and depression which leads him to an emotional outcry against the indifferent. The main aim of the study highlights the concept of existential dilemma as a philosophical problem and personality crisis by the protagonist of The Beggar novel, Omer Al-Hamzawi who had acc
... Show MoreA field Experiment was carried out in Baghdad for the purpose of compare five horticulture machines during used two types of fuel deffirance in octane number, normal and super fuel which produced in Iraqi and measuring the vibrations transmitted of the three axes are longitudinal X , lateral Y and vertical Z from handlebar in (Mowers) to the operator which walks behind the mower, and the determine of the productivity practical of cutting, productivity passing and fuel consumption. Experiment Factorial used with two factors, The first factor was Five Mowers vary in width , types, weight and company manufacturer, The Second factor was the types of fuel used internal combination engine horticulture mowers were Normal fuel with Octane Number 82
... Show MoreShow the greatness of Allah Almighty when contemplating the benefits of trees and plants in
Life in general and trees mentioned in the Koran in particular, do not have to meditate that
He acknowledges the greatness of the Almighty Creator, and his preference over man, that he is prepared for his livelihood
And give him what he can do in this life to the fullest.
The study also stressed the need to urge people to this great blessing trees
By preserving them and wasteful wastefulness.
The study also pointed to the need to guide people towards the aesthetics and improvements of
Look through and enjoy the beauty of trees, flowers, greenery and fruits ..
In this paper , an efficient new procedure is proposed to modify third –order iterative method obtained by Rostom and Fuad [Saeed. R. K. and Khthr. F.W. New third –order iterative method for solving nonlinear equations. J. Appl. Sci .7(2011): 916-921] , using three steps based on Newton equation , finite difference method and linear interpolation. Analysis of convergence is given to show the efficiency and the performance of the new method for solving nonlinear equations. The efficiency of the new method is demonstrated by numerical examples.
Mobile ad hoc network security is a new area for research that it has been faced many difficulties to implement. These difficulties are due to the absence of central authentication server, the dynamically movement of the nodes (mobility), limited capacity of the wireless medium and the various types of vulnerability attacks. All these factor combine to make mobile ad hoc a great challenge to the researcher. Mobile ad hoc has been used in different applications networks range from military operations and emergency disaster relief to community networking and interaction among meeting attendees or students during a lecture. In these and other ad hoc networking applications, security in the routing protocol is necessary to protect against malic
... Show More